![Block Purchase Pipeline Third arty Insurance Administrator of 塊購買管道第三方保險管理員_第1頁](http://file2.renrendoc.com/fileroot_temp3/2021-11/8/3215eedb-b840-42db-bc50-94137b28c939/3215eedb-b840-42db-bc50-94137b28c9391.gif)
![Block Purchase Pipeline Third arty Insurance Administrator of 塊購買管道第三方保險管理員_第2頁](http://file2.renrendoc.com/fileroot_temp3/2021-11/8/3215eedb-b840-42db-bc50-94137b28c939/3215eedb-b840-42db-bc50-94137b28c9392.gif)
![Block Purchase Pipeline Third arty Insurance Administrator of 塊購買管道第三方保險管理員_第3頁](http://file2.renrendoc.com/fileroot_temp3/2021-11/8/3215eedb-b840-42db-bc50-94137b28c939/3215eedb-b840-42db-bc50-94137b28c9393.gif)
![Block Purchase Pipeline Third arty Insurance Administrator of 塊購買管道第三方保險管理員_第4頁](http://file2.renrendoc.com/fileroot_temp3/2021-11/8/3215eedb-b840-42db-bc50-94137b28c939/3215eedb-b840-42db-bc50-94137b28c9394.gif)
![Block Purchase Pipeline Third arty Insurance Administrator of 塊購買管道第三方保險管理員_第5頁](http://file2.renrendoc.com/fileroot_temp3/2021-11/8/3215eedb-b840-42db-bc50-94137b28c939/3215eedb-b840-42db-bc50-94137b28c9395.gif)
版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認(rèn)領(lǐng)
文檔簡介
1、data security:a roadmapdodi iverson, executive vice presidentdriasirichard bellanca, senior vice presidentbank of america corporationbank of americaover 38 million consumer & small business relationshipsover 5,800 retail banking officesover 16,700 atmsover 14.7 million active online usersno. 1 o
2、verall small business administration lender in the usbank of america corporation stock (ticker: bac) is listed on the new york stock exchangehigher standardsinsurance services groupline of business within global consumer & small business bankingproducts include:qcredit protection productsqloan p
3、rotection productsqterm life insuranceqaccidental death & disabilityqhealth savings accountsqlong term care insuranceqhomeowners and auto insurancedriasioutsourcing solution for insurance and non-insurance productscarrier and product independentservice 250+ financial institutions and 50+ insuran
4、ce companiescore focus administrationend to end or modular solutionsretention and process optimizationsas 70 type iioperational excellence driven by security, innovation and reliabilitydata can only be shared internally on a need to know basis. examples include consumer information such as date of b
5、irth, marital status, social security number, health claims.information intended for internal distribution only. examples include organizational charts, inter-office mail, unreleased pilot offerings.information obtained from or intended for public disclosure. examples include marketing brochures, pr
6、ess releases, annual reports.terms & overviewdata vs. informationconfidential data proprietary datapublic dataencryption068567839068-56-7839transmitted data is coded, making it unintelligible if intercepted by a 3rd party. only the sender and the recipient have the “key” to unlock the code. secu
7、rity breachescommunications company robbed of employee datain efforts to recycle used paper, company exposes confidential customer datalaptop stolen, grad students info exposedid verification service provider sends personal, financial info to con artistsun-encrypted data with 20 years of employee da
8、ta vanishes while in transportbehavior& valuemanagementawareness &responsibilityriskassessmentsecurity design& managementexecutionkeycomponentsdata security roadmapmethods of the tradesystem hackingcodes/scamsphysical negligencestolen equipmentdisgruntled employeesidentity theft categori
9、espersonal identifiable theft:qexamples: social security number, online banking log-in/passwordqtheft is beyond a single accountqthief has ability to create additional accountsqloss potential is greaterqcriminal may wait in excess of 15 months before strikingaccount theft:qexample: credit card is st
10、olenqtheft is typically limited to a single accountqshort-term window for thiefroot causes for identity theftprevalence of ssn as a unique identifierinformation security not equal among organizationsmore information about individuals stored on central databasespersonal securityexpansion of electroni
11、c fraudkey customer data customer data that can be used against you:qchecking or credit card account numbersqsocial security numberqdrivers license numberqatm cardqdate of birthqhome addressqphone numberqcredit reportsqpasswordscommon security concernscyber threats rank higher than physical breaches
12、73% felt domestic suppliers posed less riskbuyers dont believe security claims of suppliers and are conducting their own audits 30% factoriso 17799 iso 27001sas 70 type iisource: booz allen hamilton study, june 2006data security a supplier differentiatorthennowassessing data security riskfailure mod
13、es & effects analysisexpense vs. security achieveddollarssecurity achieved100%securitydollar amount losses by typesource: csi/fbi 2005 computer crime and security survey; computer security institutesecurity technologies usedsource: csi/fbi 2005 computer crime and security survey; computer securi
14、ty institutedata stewarddata stewards ensure that a critical asset, customer and account data, is received, verified and delivered to all appropriate information users in an accessible, consistent and timely manner.data exchange process mapparticipants: 3rd party vendor (bus) 3rd party vendor (tech)
15、 bac product manager bac information mgrpurpose: introductory meeting high level overview of the data exchange processparticipants: 3rd party vendor (bus) 3rd party vendor (tech) bac information mgrpurpose: # of files file layouts frequency contacts exchange protocols quality assurance requirements
16、slaparticipants: bac information mgrpurpose: register data exchange in the central repositoryparticipants: bac dts 3rd party vendor (tech)purpose: bac dts provides email with instructions for data exchange processparticipants: bac dts 3rd party vendor (tech)purpose: exchange ip addresses exchange pa
17、sswords notification procedures automate scripts, if necessaryparticipants: bac information manager 3rd party vendor (bus) 3rd party vendor (tech)purpose: review field definitions determine valid values that vendor will provide answer additional questionsparticipants: bac information manager bac - d
18、ts 3rd party vendor (tech)purpose: test end to end file submission, connectivity testparticipants: bac information manager bac - dts 3rd party vendor (tech) 3rd party vendor (bus)purpose: file receipt and load continual feedback on new valid values or data anomaliesdata management environmentmitigat
19、ing thefttechnical infrastructureqmulti-tier architectureqmulti-factor authenticationqcontinuous server monitoringqaccess controlsbusiness processesqemployee trainingqpolicy enforcementqno confidential data on hard driveqcross shreddingqaccess controlstechnical toolsqencryptionqanti-virus/spywareqel
20、ectronic transmissions (secure sockets layer (ssl), ftp/pgp, ndm)infrastructure categoriesproduction contact routines/calendarroles & responsibilitieschange controladding new sourcesqualityquality assurance practicesmetadata managementdefect resolution processgovernance the data councildownstrea
21、m slasource data provider slauser access/standardscommunicationscommunication plandata steward programcorporate partnershipssampledo notuse your name in any formuse a word contained in dictionaries, or standard word listsuse other information easily obtained about you write a password down or store
22、it online reveal a password to anyoneuse shared accountspassword best practicesdouse a password with mixed-case lettersuse a password that contains alphanumeric characters and punctuationuse a password that can be typed quicklychange passwords regularly blak4bord2l8againseeeshorrabf&r2ocinformat
23、ion exchangeall data exchanges must be submitted via encrypted electronic transmission. never submit customer or account data via tape, cd, disks, etc.any email communication that contains confidential information must be encrypted.data exchanges between vendors that contain bac customer data must adhere to same standards as exchanging with bac.never store customer or other sensitive banking data on computer/laptop hard drives.governance elementsmajor deliverables: service level agreements source providers service level agreements information users user access request forms
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 五年級數(shù)學(xué)口算題
- 青島版數(shù)學(xué)七年級上冊5.2《代數(shù)式》聽評課記錄
- 魯教版地理六年級下冊6.2《自然環(huán)境》聽課評課記錄3
- 蘇教版三年級下冊《兩位數(shù)乘整十?dāng)?shù)的口算》教案
- 委托經(jīng)營管理協(xié)議書范本
- 蘇州蘇教版三年級數(shù)學(xué)上冊《周長是多少》聽評課記錄
- 產(chǎn)品銷售合作協(xié)議書范本(代理商版本)
- 書稿專用版權(quán)合同范本
- 酒店房屋出租辦公經(jīng)營協(xié)議書范本
- 部編版道德與法治九年級下冊《1.2復(fù)雜多變的關(guān)系》聽課評課記錄
- 義務(wù)教育數(shù)學(xué)新課標(biāo)課程標(biāo)準(zhǔn)2022年版考試真題與答案
- 新加坡房子出租合同范本
- 英語語法基礎(chǔ)知識大全
- 河南省安陽市2024年中考一模語文試卷(含答案)
- TD/T 1044-2014 生產(chǎn)項目土地復(fù)墾驗收規(guī)程(正式版)
- 2024年湖南現(xiàn)代物流職業(yè)技術(shù)學(xué)院單招職業(yè)適應(yīng)性測試題庫及答案1套
- (正式版)JTT 1499-2024 公路水運工程臨時用電技術(shù)規(guī)程
- 2024年職業(yè)技能測試題庫500道【基礎(chǔ)題】
- 垃圾桶創(chuàng)新設(shè)計說明書
- 《游戲界面設(shè)計專題實踐》課件-知識點1:游戲圖標(biāo)設(shè)計定義、分類與設(shè)計原則
- 病案信息技術(shù)(中級)考試真題及答案5篇
評論
0/150
提交評論